International Conference on Information Society (I-Society 2011) 2011
DOI: 10.1109/i-society18435.2011.5978496
|View full text |Cite
|
Sign up to set email alerts
|

Web application security: Improving critical web-based applications quality through in-depth security analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0
2

Year Published

2012
2012
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(8 citation statements)
references
References 3 publications
0
6
0
2
Order By: Relevance
“…N. Teodoro, C. Serrão [27] identify the relationship between lack of security and Software Development Life Cycle (SDLC). Based on this analysis, the authors present a set of security automation tools and methodologies that are used in the course of the SDLC to improve the quality of Web applications.…”
Section: Businessmentioning
confidence: 99%
“…N. Teodoro, C. Serrão [27] identify the relationship between lack of security and Software Development Life Cycle (SDLC). Based on this analysis, the authors present a set of security automation tools and methodologies that are used in the course of the SDLC to improve the quality of Web applications.…”
Section: Businessmentioning
confidence: 99%
“…Input values that expose these vulnerabilities were searched by a genetic algorithm and, to help the genetic algorithm escape local optima, symbolic constraints were collected at run-time and passed to a solver. Teodoro and C. Serrao [3] discussed the direct implication of the lack of security and the importance of quality of the Software Development Life Cycle (SDLC), and the major factors that influence them. Furthermore, they proposed a set of security automated tools and methodologies that can be used throughout the SDLC as a means to improve critical web-based applications security and quality.…”
Section: Related Workmentioning
confidence: 99%
“…Most of the time, these malicious users succeed in exploiting different types of vulnerabilities and the consequences can be disastrous. Most of these vulnerabilities are directly related with the web-based application"s lack of quality as a result from a poorly implemented Software Development Life Cycle (SDLC) [3]. According to Tian et al [4] web application software security becomes more and more important as a result information access through web applications.…”
Section: Introductionmentioning
confidence: 99%
“…Mesmo aqueles sistemas que oferecem serviços onlinemenos atraentes são alvo de ataques, pois os servidores que hospedam os sistemas online vulneráveis servem para os atacantes como pontes para consequentesataques às vítimas mais visadas, como aquelas que possuem dados e informações financeiras de clientes. Logo, é visível a crescente necessidade de boas práticas de segurança no contexto de sistemas Web [8,9]. Isso inclui, com especial atenção, a detecção e o diagnóstico de vulnerabilidades nos sistemas.…”
Section: Introductionunclassified
“…Entre osmaisfrequentesestãoa inclusão remota de arquivos, SQL Injection e cross-scripting [15]. Não obstante, existem outros tipos de vulnerabilidades, comoformasavançadas e de segundaordem de XSS e SQL-i, variações de Cross-Channel Scripting eCross-Site Request Forgery, que aindaestãodescobertaspelasferramentasexisten tes [11].Osresultadosde diferentes pesquisas [8,9,11,12,13] apontamqueaindaháespaçoparainvestigação, inovação e desenvolvimentona área de scanners de vulnerabilidadesvoltados paraaplicações Web.…”
Section: Introductionunclassified